hperrin
@hperrin@lemmy.ca
- Comment on When I first heard of the term "nuclear family", I thought it was referring to the fact that 20 century families had to deal with the constant fear of losing their family to a nuclear bomb. 44 minutes ago:
It refers to the nucleus of the family, which is where the jeans are stored (closet). Every conservative, Christian, god-fearing nuclear family has at least one family member in the closet. Usually, it’s Lindsey Graham. It’s always Lindsey Graham.
- Comment on X down – latest: Twitter and Grok not working in another major outage 2 days ago:
Keep it down this time.
- Comment on I wonder what would've happened if Lego bought Minecraft 3 days ago:
Lego used to have a brand called Modelex with 1x1x1 aspect ratio bricks. The brand is still around, but not owned by Lego anymore.
- Comment on Bandcamp bans purely AI-generated music from its platform 4 days ago:
Just watch, we’re two weeks away from some tech bro trying to start a Clankercamp website.
- Comment on OpenAI launches ChatGPT Health, encouraging users to connect their medical records 1 week ago:
Absolutely fucking not. I don’t need a sycophantic hallucinatory robot telling me to drink bleach to cure my athlete’s foot.
- Comment on I can still smell them 1 week ago:
Do they not make cap guns anymore?
- Comment on Microsoft Office has been renamed to “Microsoft 365 Copilot app” 1 week ago:
I think if has to do with how often you pay for it. With Office, you just buy it, then you own it. With Office 365, you have to pay for it 365 days a year. You just never stop paying for it.
- Comment on Microsoft Office has been renamed to “Microsoft 365 Copilot app” 1 week ago:
OnlyOffice and LibreOffice are still called OnlyOffice and LibreOffice.
- Comment on I’m not saying that I agree with right- or center-wing views, and I do condemn transphobia. However, do you think there should be a distinction between critiquing beliefs held by transgender people, and engaging in transphobia? 2 weeks ago:
Idk, I’m just not interested in policing other people’s genders.
- Comment on Banana For Scale 2 weeks ago:
My spoon is too big.
- Comment on Banana For Scale 2 weeks ago:
That’s silly. Here, I added an actual to-scale banana to this photo:
- Comment on Salesforce regrets firing 4000 experienced staff and replacing them with AI 2 weeks ago:
That’s what happens when idiots are in charge.
- Comment on "i can hear the difference" 3 weeks ago:
Giving them the benefit of the doubt, I would think it’s to resist corrosion, but there are plenty of cheaper metals to plate with that don’t corrode, so even that’s a stretch.
- Comment on What the Linux desktop really needs to challenge Windows 3 weeks ago:
A lot of people just want a browser that works. They don’t care at all about anything else in the OS. For them, Linux can be perfect. So if they’re disgruntled that Windows keeps shoving ads and AI bullshit in their eyeballs, when all they want to do is check their email and watch YouTube, a preinstalled Linux laptop is a great answer.
- Comment on Nvidia GeForce Now’s Time Limit Will Stop Gamers After 100 Hours Each Month 3 weeks ago:
- Comment on Nvidia GeForce Now’s Time Limit Will Stop Gamers After 100 Hours Each Month 3 weeks ago:
Oh come on! I could get through that in just over four days.
- Comment on xkcd #3186: Truly Universal Outlet 3 weeks ago:
Simple, just use a metal mesh in each hole. Make sure it’s a really thin mesh too, like practically steel wool. Pushing 15 amps through steel wool has never caused anyone any problems ever.
- Comment on Silent night 3 weeks ago:
I like that one guy’s drug trip from 2000 years ago has caused this hilarious internet meme.
- Comment on [deleted] 3 weeks ago:
Basically, in public key cryptography, you can generate two sets of numbers that are mathematically related, one called the private key and one called the public key, collectively called a key pair.
Through a lot of fancy math, you, with your private key, can take a number I give you and give me back another number called a signature. I, with your public key, can do even more fancy math to prove that you do, in fact, have the corresponding private key to the public key I have based on this signature.
If you give me the wrong signature, I can’t trust that you have the private key, and you don’t get authenticated, but if you give me the right signature, I can trust that you’re you, and you get authenticated.
- Comment on [deleted] 3 weeks ago:
A number of things. The key is stored on a separate coprocessor from the CPU, so the CPU doesn’t even know the private key. That takes its own protocol, over either i2c or usb. Then the browser has to coordinate that protocol to communicate with the web protocol from the frontend JS. There’s also the concept of server verification as well, so it’s a more complicated handshake than just one signature going one way. Then, of course, there’s the inherent complexity of public key cryptography in general, but you only need to worry about that if you’re writing it from scratch with no library.
From a basic web dev perspective, it’s not much more complex than a password, but that’s because the complexity of the protocols is hidden behind the libraries. A password actually isn’t complex, even when you remove the libraries.
- Comment on [deleted] 3 weeks ago:
Here, these specs are what they’re based on:
- Comment on Google's mail system helpfully classified this notice of a class action settlement AGAINST GOOGLE as spam 3 weeks ago:
Google’s spam filter is absolute trash, so it wouldn’t surprise me at all if it’s a false positive. Everyone loves Google’s spam filter, cause they hardly ever see spam, but that’s because it’s incredibly aggressive, and constantly makes false positives.
If you mark everything as spam, you’ll catch all the spam, right?
- Comment on [deleted] 3 weeks ago:
Yes, kind of. You’re still giving them your password every time you log in. And it’s on them whether they store it hashed or in plain text. With a passkey, you know that even if they’re hacked, they’ll never get your actual private key.
- Comment on [deleted] 3 weeks ago:
A passkey is a key pair where you keep the private key and give the public one to the service. Then you can log in by proving you have the private key. Fairly simple in theory. Horribly complex in practice.
- Comment on G-Assist is ‘real’: NVIDIA unveils NitroGen, open-source AI model that can play 1000+ games for you 3 weeks ago:
That’s cool. AI can do art and writing and video games for me. It can watch all my shows. All I have to do is work and maybe sleep. Sounds fun.
- Comment on Why do we produce so much porn? 4 weeks ago:
I’m pretty sure any species that reproduces sexually would be considered a bunch of perverts. You ever been around a cat in heat? Fucking perverts.
- Comment on Do you rebuild your container images yourself? 4 weeks ago:
I don’t think a year old base is bad. Unless there’s an absolutely devastating CVE in something like the network stack or a particular shared library, any vulnerabilities in it will probably be just privilege escalations that wouldn’t have any effect unless you were allowing people shell access to the container. Obviously, the application itself can have a vulnerability, but that would be the case regardless of base image.
- Comment on AI Vending Machine Was Tricked into Giving Away Everything 4 weeks ago:
It’s hilarious to me that we’ve known for so long that humans are the weakest link in any security chain, and yet we’ve built this weakness right into our machines now.
- Comment on AI-authored code contains worse bugs than software crafted by humans 4 weeks ago:
The AI proofread it and said it was great.
- Comment on AI-authored code contains worse bugs than software crafted by humans 4 weeks ago:
It’s actually impressive that it learned to be the most average programmer, and ended up being way shittier.